Security Analysis of Remote Tower Control

dc.contributor.authorMusanje Kasozi, Joseph Brian
dc.contributor.authorMale, Henry Kenneth
dc.date.accessioned2018-12-17T20:34:45Z
dc.date.available2018-12-17T20:34:45Z
dc.date.issued2015
dc.description.abstractThe main target of the analysis is the Remote Tower control center. This will provide Air traffic control services for more than one airport by a single operator in a remote location therefore eliminating an individual control tower located on the individual airport premises. The Remote tower is expected to offer a full range of air traffic services such that the airspace users are not negatively impacted compared to the traditional local control tower. Furthermore, the analysis focuses on the Identity & access management, web application & database, networking and infrastructure. In order to analyse the threats and risks of the remote tower control center, the following assumptions were considered. ● All the already existing features ,services and systems etc are secured ● All the new features, services and systems need to be secured ● There is also some channel of communication between the Remote tower and the airport ● The new features are compatible with the current airport system In identity and access management, some of the main identified assets included, domain naming service, directory service, information server and out of the window system. these assets can be affected by the unauthorised access to data by employees and denial of service attack launched by an attacker or malicious employee. The proposed controls to these threats include installation of intrusion detection systems and segregation of duties For web application and database security, system identification information, encryption and decryption service and the network configurations were considered to be the main assets. These assets face crosssite scripting and SQL injections as some of the main threats. These threats could be mitigated or eliminated by integration of the database server into the security gateway and eliminating flaws Routers and switches, remote tower control communication and operating systems were the main assets identified in the networking and infrastructure. All these assets are faced by a risk, loss and destruction of infrastructure which can be brought about by malicious employees or hackers manipulating management parameters, however these threats can be controlled by installation of firewalls, setting up security policies and installation of electronic access control systems.en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12280/1257
dc.language.isoenen_US
dc.publisherUniversity of Trentoen_US
dc.subjectRemote Tower control centeren_US
dc.subjectAir traffic control servicesen_US
dc.subjectAirporten_US
dc.subjectAir traffic servicesen_US
dc.subjectUnauthorised accessen_US
dc.subjectCrosssite scriptingen_US
dc.subjectSQL injectionsen_US
dc.titleSecurity Analysis of Remote Tower Controlen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Kasozi_SCIE_Article_2015.pdf
Size:
385.15 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: